CVE-2011-4542
Severity CVSS v4.0:
Pending analysis
Type:
CWE-89
SQL Injection
Publication date:
30/11/2011
Last modified:
11/04/2025
Description
Hastymail2 2.1.1 before RC2 allows remote attackers to execute arbitrary commands via the (1) rs or (2) rsargs[] parameter in a mailbox Drafts action to the default URI.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:hastymail:hastymail2:*:beta1:*:*:*:*:*:* | ||
cpe:2.3:a:hastymail:hastymail2:*:beta2:*:*:*:*:*:* | ||
cpe:2.3:a:hastymail:hastymail2:*:beta3:*:*:*:*:*:* | ||
cpe:2.3:a:hastymail:hastymail2:*:rc1:*:*:*:*:*:* | ||
cpe:2.3:a:hastymail:hastymail2:*:rc2:*:*:*:*:*:* | ||
cpe:2.3:a:hastymail:hastymail2:*:rc3:*:*:*:*:*:* | ||
cpe:2.3:a:hastymail:hastymail2:*:rc4:*:*:*:*:*:* | ||
cpe:2.3:a:hastymail:hastymail2:*:rc5:*:*:*:*:*:* | ||
cpe:2.3:a:hastymail:hastymail2:*:rc6:*:*:*:*:*:* | ||
cpe:2.3:a:hastymail:hastymail2:*:rc7:*:*:*:*:*:* | ||
cpe:2.3:a:hastymail:hastymail2:*:rc8:*:*:*:*:*:* | ||
cpe:2.3:a:hastymail:hastymail2:*:rc9:*:*:*:*:*:* | ||
cpe:2.3:a:hastymail:hastymail2:*:rc1:*:*:*:*:*:* | 2.1.1 (including) | |
cpe:2.3:a:hastymail:hastymail2:1.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:hastymail:hastymail2:1.01:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page